Affiliation:
1. School of Computer Science, Faculty of Science and Engineering, University of Nottingham Ningbo China, Ningbo 315100, China
Abstract
Today, the use of wireless sensor networks has grown rapidly; however, wireless sensor networks are prone to receiving cyber-physical attacks. Time synchronization is a fundamental requirement for protocols in wired and wireless sensor network applications; hence, secure time synchronization is also crucial. This paper presents an introduction to time synchronization, including the concepts, challenges, and requirements of time synchronization protocols. The scope of the paper includes both software- and hardware-based protocols. Then, different time synchronization methods are analyzed. Moreover, research progress in secure time synchronization is reviewed. The survey also discusses the weaknesses of current secure time synchronization protocols and provides suggestions for future research directions. This survey aims to highlight research progress and trends in time synchronization and secure time synchronization.
Funder
Ningbo Major Science & Technology
Ningbo Commonwealth
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference66 articles.
1. Yang, W., Wang, Q., Qi, Y., and Sun, S. (2014, January 17–18). Time synchronization attacks in IEEE802. 15.4 e networks. Proceedings of the 2014 International Conference on Identification, Information and Knowledge in the Internet of Things, Beijing, China.
2. Secure Time Synchronization for Wireless Sensor Network;Dhule;Int. J. Emerg. Technol. Adv. Eng.,2014
3. Poovendran, R., Wang, C., and Roy, S. (2007). Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Springer Science & Business Media.
4. Security vulnerabilities in wireless sensor networks: A survey;Kavitha;J. Inf. Assur. Secur.,2010
5. Secure Time Synchronization in Sensor Networks;Ganeriwal;ACM Trans. Inf. Syst. Secur.,2008
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献